what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

labs2001-01.txt

labs2001-01.txt
Posted Mar 16, 2001
Site ussrback.com

USSR Advisory USSR-2001001 - The Windows SSH server (sshd) v2.4 is vulnerable to a denial of service attack. It can not handle more than 64 simultaneous connections. Fixed in v2.5.

tags | denial of service
systems | windows
SHA-256 | 3bdcb948c7b107ba1452c0a142cd268be0238e2a66b1e53cfb568e358b5c21ed

labs2001-01.txt

Change Mirror Download
 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


U.S.S.R labs
Buenos Aires, Argentina
http://www.ussrback.com

Topic: Remote DoS attack against SSH Secure Shell for
Windows Servers Vulnerability
USSR Advisory Code: USSR-2001001
Announced: 2001-03-16
Credits: Luciano Martins <luck@ussrback.com>
Affects: SSH Secure Shell for Windows Server 2.4
Corrected: SSH Secure Shell for Windows Server 2.5 available
soon
Vendors Affected: SSH Communications Security Corp
http://www.ssh.com/

1. Discussion

UssrLabs has recently discovered a problem with Windows versions of
sshd.
The problem lies with adjacent connection handling where the sshd is
unable to handle 64 simulataneous connections. As a result the sshd
will
crash, and no services to the sshd will be accepted.

The problem lies in ssheloop.c where the assertion test fails.

The Event Log displays the following code after 64 connections are
spawned:

FATAL ERROR: E:\src\lib\sshutil\ssheloop\win32\ssheloop.c:1597
SshEventLoop
(function name unavailable) Assertion failed:
ssh_adt_num_objects(ssh_eloop_events) < 64

No doubt, proper error handling techniques have not been implemented
for
the SshEventLoop which ultimately causes the crash.

This results in a Denial of Service against the service in question.


2. Vendor Status:
Informed, Contacted.

3. Fix:
official fix will be available soon.

Related Links:

Underground Security Systems Research:
http://www.ussrback.com

CrunchSp Product:
http://www.crunchsp.com

About:

USSR is an emerging security company based in South America.
We are devoted to network security research, vulnerability research,
and software protection systems. One of the main objectives of USSR
is to develop and implement cutting edge security and protection
systems
that cater to an evolving market.

We believe that the way we implement security solutions can make a
difference. CrunchSP is an example, providing a solution to software
piracy. Our solutions such as CrunchSP are devoted to protecting your
enterprise.

On a daily basis, we research, develop, discover and report
vulnerability information. We make this information freely available
via public forums such as BugTraq, and our advisory board located at
http://www.ussrback.com.

The USSR is a highly skilled, experienced team. Many USSR
programmers, as well as programmers of partners and affiliates, are
seasoned professionals, with 12 or more years of industry experience.
A
knowledge base of numerous computer applications as well as many high
and
low level programming languages makes USSRback a diverse team of
experts
prepared to serve the needs of any customer.

USSR has assembled some of the world's greatest software developers
and security consultants to provide our customers with a wide range
of enterprise level services. These services include:

* Network Penetration Testing
* Security Application development
* Application Security Testing and Certification
* Security Implementations
* Cryptography
* Emergency Response Team
* Firewalling
* Virtual Private Networking
* Intrusion Detection
* Support and maintenance

For more information, please contact us via email at
labs@ussrback.com.

Copyright (c) 1999-2000 Underground Security Systems Research.
Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without explicit
consent of USSR. If you wish to reprint whole or any part of this
alert in any other medium excluding electronic medium, please e-mail
labs@ussrback.com for permission.

Disclaimer:
The information within this paper may change without notice. We may
not be held responsible for the use and/or potential effects of these
programs or advisories. Use them and read them at your own risk or
not at all. You solely are responsible for this judgment.

Feedback:

If you have any questions, comments, concerns, updates, or
suggestions please feel free to send them to:

Underground Security Systems Research
mail:labs@ussrback.com
http://www.ussrback.com

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.1

iQA/AwUBOrEM663JcbWNj6DDEQJllgCgr26/1PThgwtGt+qFAojQ1YgIsOAAoPol
er7tM1jdHclYzpWzztAu8ykr
=wTwP
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close